Cloud computing platforms deliver critical business applications in large part because of sales commitments to security and privacy. With the help of cloud computing, large pools of resources
can be connected via private or public networks to provide dynamically scalable infrastructures for
application, data and file storage. Additionally, the costs of computing, application hosting, content
storage and delivery can be significantly reduced. However, problems arise with cloud computing
concerning data privacy, security and authenticity. Hence, our research paper presents an efficient
method for providing data-storage security in cloud computing using a new simple symmetric key
algorithm. This algorithm includes such important security services as key generation, encryption
and decryption that are provided in cloud computing systems. The main scope of this paper is to
solve the security issues in both cloud providers and cloud consumers using new cryptography
methods.

Slamet Suripto and Iswanto, University of Muhammadiyah Yogyakarta,Indonesia.

Abstract

Increasingly widespread and sophisticated electricity theft committed by businesses and households to
make the losses suffered by the State greater. Indicators that can be used as a reference to determine
whether the sector in the load point of theft is to observe changes in the value of current flowing in the
load point, because in every area of distribution the value of current flowing is determined by PLN. But
keep in mind that changes to the current value of a network is not only due solely because of theft but the
change in the value of the current can also be caused by external factors, such as lightning disturbances.
To solve the theft of electricity is then needed a measuring tool for observing changes in the value of
current that can be used in a power grid which then gauge observations are compared with data obtained
information from the registrar meter. In the design and manufacture of equipment, data transmission
measurements using FM radio communication because communication is more resistant to FM
interference (noise). Data measurement results must be recorded and stored on a computer.